Skip to content

Latest commit

 

History

History
89 lines (76 loc) · 3.95 KB

227-Introduction-to-Cryptography.org

File metadata and controls

89 lines (76 loc) · 3.95 KB

<<<CP1227>>> INTRODUCTION TO CRYPTOGRAPHY

{{{credits}}}

LTPC
3003

Course Objectives

  • To understand the classical and symmetric cryptographic techniques.
  • To study about message authentication and hash functions.
  • To acquire knowledge on number theory fundamentals needed by cryptographic algorithms.
  • To understand the various key distribution and management schemes.
  • To understand the concepts of Public key cryptography and digital signatures.

{{{unit}}}

Unit IIntroduction and Classical Cryptography & Symmetric Cryptography10

Cryptography and Modern Cryptography – Setting of Private-Key Encryption – Historical Ciphers and Their Cryptanalysis – The Basic Principles of Modern Cryptography; Perfectly Secret Encryption: Definitions and Basic Properties – The One-Time Pad – Limitations of Perfect Secrecy; Private-Key Encryption: A Computational Approach to Cryptography– Computationally Secure Encryption – Pseudo-randomness – Constructing Secure Encryption Schemes – Security Against Chosen-Plaintext Attacks (CPA) – Constructing CPA-Secure Encryption Schemes – Security Against Chosen-Ciphertext Attacks (CCA).

Unit IIMessage Authentication Codes and Collision-Resistant Hash Functions8

Secure Communication and Message Integrity – Encryption vs. Message Authentication – Message Authentication Codes – Constructing Secure Message Authentication Codes – CBC-MAC – Collision-Resistant Hash Functions – NMAC and HMAC – Constructing CCA-Secure Encryption Schemes – Obtaining Privacy and Message Authentication.

Unit IIIBlock Ciphers9

Substitution-Permutation Networks – Feistel Networks – DES – Increasing the Key Length of a Block Cipher – AES – Differential and Linear Cryptanalysis; One-Way Functions – From One-Way Functions to Pseudo randomness – Constructing Pseudorandom Generators – Constructing Pseudorandom Functions – Constructing Pseudorandom Permutations – Necessary Assumptions for Private-Key Cryptography.

Unit IVNumber Theory & Key Distribution9

Number Theory: Preliminaries and Basic Group Theory – Primes, Factoring, and RSA – Assumptions in Cyclic Groups – Cryptographic Applications of Number-Theoretic Assumptions; Private-Key Management and the Public-Key Revolution: Limitations of Private-Key Cryptography – Key Distribution Centers – The Public-Key Revolution – Diffie-Hellman Key Exchange.

Unit VPublic-Key Encryption & Digital Signature9

Public-Key Encryption – An Overview – Definitions – Hybrid Encryption – RSA Encryption – The El Gamal Encryption Scheme – Security Against Chosen-Ciphertext Attacks; Digital Signatures Schemes : An Overview – Definitions – RSA Signatures - -The Hash-and-Sign Paradigm – Lamport’s One-Time Signature Scheme – Signatures from Collision-Resistant Hashing – The Digital Signature Standard –Certificates and Public-Key Infrastructures.

\hfill Total: 45

Course Outcomes

Upon the completion of the course the students should be able to:

  • Describe and implement classical and symmetric ciphers (K2)
  • Classify and discuss various attacks (K3)
  • Compare and contrast symmetric and asymmetric encryption systems (K3)
  • Describe the authentication schemes and hash algorithms (K2)
  • Illustrate various Public key cryptographic techniques (K3)

References

  1. Jonathan Katz, Yehuda Lindell, “Introduction to modern cryptography”, Second Edition, Chapman & Hall/CRC Cryptography and Network Security Series, 2014.
  2. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2004.
  3. Johannes A. Buchmann, “Introduction to Cryptography”, 2nd edition, Pearson Education, Springer, 2009.
  4. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, Third Edition, Prentice Hall of India, 2006.
  5. http://nptel.ac.in/courses/106105031/lecture by Dr. Debdeep Mukhopadhyay, IIT Kharagpur.